Chapter 16: The Operating System’s “Dead Drop” – Abusing SRUM for Covert Communication Channels
16.1 Introduction: Bypassing Network Monitoring with Internal Channels
16.2 Foundation: Architecture and Operation of SRUM in Windows
16.3 Technical Analysis: SRUM-Based Metric Encoding
16.3.2 Encoding and Decoding Messages: Techniques and Optimization
16.4 Impacts and Real-World Applications
16.4.2 Applications in Advanced Attack Scenarios
16.5 Defensive Strategies: Monitoring and Anomaly Detection in SRUM
16.5.2 Building Baselines and Anomaly Detection with Machine Learning
thevieart•2h ago
16.1 Introduction: Bypassing Network Monitoring with Internal Channels 16.2 Foundation: Architecture and Operation of SRUM in Windows 16.3 Technical Analysis: SRUM-Based Metric Encoding 16.3.2 Encoding and Decoding Messages: Techniques and Optimization 16.4 Impacts and Real-World Applications 16.4.2 Applications in Advanced Attack Scenarios 16.5 Defensive Strategies: Monitoring and Anomaly Detection in SRUM 16.5.2 Building Baselines and Anomaly Detection with Machine Learning